Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-02-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win10v20201028
General
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js family_wshrat C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js family_wshrat -
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\234.exe family_agenttesla C:\Users\Admin\AppData\Roaming\234.exe family_agenttesla -
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 5 3656 wscript.exe 7 3656 wscript.exe 14 3656 wscript.exe 15 3656 wscript.exe 17 3656 wscript.exe 18 3656 wscript.exe 19 3656 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
234.exepid process 3000 234.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
wscript.exe234.exewscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\File Transfer Protocol = "C:\\Users\\Admin\\AppData\\Roaming\\File Transfer Protocol\\File Transfer Protocol.exe" 234.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
234.exepid process 3000 234.exe 3000 234.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
234.exedescription pid process Token: SeDebugPrivilege 3000 234.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
wscript.exewscript.exedescription pid process target process PID 1048 wrote to memory of 3656 1048 wscript.exe wscript.exe PID 1048 wrote to memory of 3656 1048 wscript.exe wscript.exe PID 3656 wrote to memory of 3000 3656 wscript.exe 234.exe PID 3656 wrote to memory of 3000 3656 wscript.exe 234.exe PID 3656 wrote to memory of 3000 3656 wscript.exe 234.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Roaming\234.exe"C:\Users\Admin\AppData\Roaming\234.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a106c2c204a3293e9779659f97626c55
SHA1089369226c1cc2280423238cb9a812a7c07616aa
SHA2567f6602b33eca9d5a407517f106bba38581c8265ff62d65cf29532754f855bdfa
SHA5125c53704a03b089909479b630bca7ed191442dfd26acb39b9089d7f0046098000d1ecb2f50bd36477b6244cfc2016ba34d96c69741e51ab12ffa1c51728cb8252
-
MD5
a106c2c204a3293e9779659f97626c55
SHA1089369226c1cc2280423238cb9a812a7c07616aa
SHA2567f6602b33eca9d5a407517f106bba38581c8265ff62d65cf29532754f855bdfa
SHA5125c53704a03b089909479b630bca7ed191442dfd26acb39b9089d7f0046098000d1ecb2f50bd36477b6244cfc2016ba34d96c69741e51ab12ffa1c51728cb8252
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
MD583ef3f626544cef2f0962863ab109634
SHA148d5a062ea59ea06afc5334a43f2537390660538
SHA2565a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
SHA512d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
-
MD5
83ef3f626544cef2f0962863ab109634
SHA148d5a062ea59ea06afc5334a43f2537390660538
SHA2565a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
SHA512d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9